StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Security Breach at Nelm - Case Study Example

Cite this document
Summary
In the paper “The Security Breach at Nelm” the author analyzes the security breach, which has resulted in data being acquired by unauthorized users tapping into the system and gaining access to sensitive files. There is a concern that an insider is gaining information on the advertising campaign…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
The Security Breach at Nelm
Read Text Preview

Extract of sample "The Security Breach at Nelm"

There should only be a limited number of people in the marketing department that have access to the advertising files. This would eliminate unauthorized access to this sensitive information by a member of the production or engineering staff.If the attack is coming from an outside source, system access needs to be secured and limited. This may be done by the addition of an effective user ID and password system. The system should require regular changing of the passwords and have a mechanism to lock out the user after a limited number of failed attempts to stop a brute force attack.

In addition, IP address monitoring should be implemented and users should be restricted from entering the system only from approved IPs. This would prevent off-site hackers from gaining access to the system. To further secure the system, the Web server needs to be properly configured. The web-based e-mail system will give unauthorized users a portal that may be exploited if the server has security flaws in it. An adequate firewall should be implemented that blocks most illegal activity. Weblogs should be constantly monitored for unauthorized activity.

In addition, sensitive server configuration files should only be accessible by the head of security. The system needs to be constantly updated to include the latest security patches, inactive users deleted and evaluated for an ongoing threat assessment.In most cases, data is stolen by the easiest method possible. When large numbers of employees have access to the entire system, it opens the possibility of insider theft of data. Internally, the system needs to be secured from users who are not authorized to view or alter certain files.

Authorized users need to change their passwords regularly to prevent unauthorized acquisition by a third party. To prevent access from outside hackers, the webserver needs to be configured and updated to an appropriate level of security. Limited access by IP address or through a firewall would help prevent unauthorized access. Monitoring weblogs to see who is accessing the files and when would point out irregularities. In data security, there is no one answer, but rather a series of actions that need to be taken at several levels in the information system.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Security Breach at Nelm Essay Example | Topics and Well Written Essays - 500 words, n.d.)
The Security Breach at Nelm Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1519213-the-security-breach-at-nelm
(The Security Breach at Nelm Essay Example | Topics and Well Written Essays - 500 Words)
The Security Breach at Nelm Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1519213-the-security-breach-at-nelm.
“The Security Breach at Nelm Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1519213-the-security-breach-at-nelm.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Security Breach at Nelm

Choose a recent IS security breach or service outage that has been in the media

Basically, security attacks and breaches may or may not depend on what is included within the term “security breach.... ?? In this scenario, the majority of information… ecurity laws and regulations describe “security breach” as an illegal access to a particular set of personal data and information (in the US, typically  information employed to produce or get access to financial accounts) (Nash; Cate). For this paper, I have chosen a ID # A security breach or service outage that has been in the media In the past few years, information security has become a serious challenge for the business organizations....
2 Pages (500 words) Essay

Security Analysis and Redesign of a Network

The coursework "security Analysis and Redesign of a Network" presents the review of the current network infrastructure of the XYZ company.... Further, the report presents a security policy write-up, which will guide the organization with regards to spyware, antivirus, and adware policies....
14 Pages (3500 words) Coursework

Are the German Banks Riskier than the European Competitors

The paper "Are the German Banks Riskier than the European Competitors?... tries to capture the risk content of the financial institutions of the German and non-German European banks through assessing the diversifications in the proportion of liquid assets that the banks possess.... hellip; This paper is an attempt to assess how far the policy measures have been successful, especially in comparison to similar measures adopted by the European counterparts....
7 Pages (1750 words) Research Proposal

Contribution of the Common European Asylum System Members

hellip; Asylum is awarded to such people who run away from their country of origin out of fear to be persecuted or assaulted and as an outcome desire global security.... It is the objective of the EU Directive to align these statuses by stipulating minimum criteria to qualify for these statuses of non-EU nationals and stateless individuals as refugees or people in need of global security as refugees (EU: Who can benefit from international protection in the EU?...
20 Pages (5000 words) Coursework

Long Beam Span

hellip; The prevalent provisions present at the workplace should be taken care of in terms of their security and restriction towards unlimited usage of provisions.... From the paper "Long Beam Span" it is clear that the Client's Representative Project Manager must be accessed and should concede to the development of a file containing information of the project's advances from the beginning till the end....
14 Pages (3500 words) Coursework

Aspects of Food Security in Brazil

This coursework "Aspects of Food security in Brazil" describes main characteristic of this notion.... Nearly 47 million children benefited from the initiative by the year 2007 indicating positive progress on improving food security.... Food security can basically be termed as a situation where all citizens can afford to physically, economically or socially acquire safe and nutritious food.... Brazil has been on the crisis of sustaining stable food security because of barriers like food access, availability, and utilization....
7 Pages (1750 words) Coursework

Building Environmental Assessment Method (BEAM)

 This essay analyses building environmental assessment method because BEAM building is more secure, healthier, more agreeable, more utilitarian and more proficient than a comparable building that does not accomplish the level of execution endorsed in BEAM.... nbsp;…  Indoor issues included in BEAM are those parts of building execution that effect on the wellbeing, solace or prosperity of the tenants, and in addition parts of execution that enhance quality and usefulness....
12 Pages (3000 words) Assignment

Food Security in Kenya

… Contemporary Global Issues: Food security in KenyaIntroductionKenya, despite of it being regarded as one of the world towering giant in tourism and vast natural resources still lags behind in providing food security for its citizens.... Kenya boasts of Contemporary Global Issues: Food security in KenyaIntroductionKenya, despite of it being regarded as one of the world towering giant in tourism and vast natural resources still lags behind in providing food security for its citizens....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us